• 제목/요약/키워드: Internet Applications

검색결과 2,427건 처리시간 0.027초

Analysis of Key Fourth Industrial Revolution Technologies and Their Applications

  • Leen, Byeong Hyeon;Seo, Kiwon;Jo, Sung-Hun
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.552-553
    • /
    • 2022
  • Key technologies of Fourth Industrial Revolution and their innovative applications are expected to bring another technological revolution going forward. The present study takes a close look at the Internet of Things (IoT) among the key technologies of the Fourth Industrial Revolution. In particular, sensor devices, which serve as the core of IoT-based application systems, are analyzed. This study also examines various applications and solutions using IoT-based systems.

  • PDF

An Anomalous Behavior Detection Method Using System Call Sequences for Distributed Applications

  • Ma, Chuan;Shen, Limin;Wang, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권2호
    • /
    • pp.659-679
    • /
    • 2015
  • Distributed applications are composed of multiple nodes, which exchange information with individual nodes through message passing. Compared with traditional applications, distributed applications have more complex behavior patterns because a large number of interactions and concurrent behaviors exist among their distributed nodes. Thus, it is difficult to detect anomalous behaviors and determine the location and scope of abnormal nodes, and some attacks and misuse cannot be detected. To address this problem, we introduce a method for detecting anomalous behaviors based on process algebra. We specify the architecture of the behavior detection model and the detection algorithm. The anomalous behavior detection and analysis demonstrate that our method is a good discriminator between normal and anomalous behavior characteristics of distributed applications. Performance evaluation shows that the proposed method enhances efficiency without security degradation.

GreenIoT Architecture for Internet of Things Applications

  • Ma, Yi-Wei;Chen, Jiann-Liang;Lee, Yung-Sheng;Chang, Hsin-Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.444-461
    • /
    • 2016
  • A power-saving mechanism for smartphone devices is developed by analyzing the features of data that are received from Internet of Things (IoT) sensors devices to optimize the data processing policies. In the proposed GreenIoT architecture for power-saving in IoT, the power saving and feedback mechanism are implemented in the IoT middleware. When the GreenIoT application in the power-saving IoT architecture is launched, IoT devices collect the sensor data and send them to the middleware. After the scanning module in the IoT middleware has received the data, the data are analyzed by a feature evaluation module and a threshold analysis module. Based on the analytical results, the policy decision module processes the data in the device or in the cloud computing environment. The feedback mechanism then records the power consumed and, based on the history of these records, dynamically adjusts the threshold value to increase accuracy. Two smart living applications, a biomedical application and a smart building application, are proposed. Comparisons of data processed in the cloud computing environment show that the power-saving mechanism with IoT architecture reduces the power consumed by these applications by 24% and 9.2%.

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.

위피 응용프로그램 개발환경 설계 및 구현 (Design and Implementation of Development Environment for WIPI Applications)

  • 유용덕;박충범;최훈;김우식
    • 정보처리학회논문지C
    • /
    • 제12C권5호
    • /
    • pp.749-756
    • /
    • 2005
  • 모바일 인터넷 응용프로그램을 빠르고 저렴한 비용으로 개발하기 위하여 위피 응용프로그램 개발 환경, 즉 CNU 위피 에뮬레이터를 개발하였다. CNU 위피 에뮬레이터는 안정적인 메모리 관리 기능을 가지며, 위피 버전 1.2 규격에서 정의하는 기능과 WAM(WIPI Application Manager)을 이용한 응용프로그램의 설치, 실행, 삭제 및 관리 기능들을 제공한다. 또한 위피 응용프로그램 생명 주기에 맞는 경량 스케줄링 방식을 사용함에 따라 응용프로그램의 빠른 실행과 안정적인 디버깅 기능을 제공한다. 본 논문은 개발한 CNU 위피 에뮬레이터의 설계 및 구현 특징에 대하여 기술하며, 기존 위피 에뮬레이터들과의 비교 실험을 통하여 응용프로그램 실행의 안정성과 $25\%$ 이상의 실행 성능 향상을 제시하였다.

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • 제27권1호
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

X-Internet 기반의 어플리케이션과 웹 어플리케이션의 성능평가 (Performance Analysis on X-Internet Based Applications and Web Applications)

  • 이우기;이정훈;윤석호;차창일;최영미
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2005년도 춘계학술발표대회
    • /
    • pp.67-70
    • /
    • 2005
  • 최근 응용 프로그램은 대다수가 웹으로 이루어져 있다. 그것은 빠르게 변화하는 비즈니스 시장에서 살아남기 위해 기업들이 배포 및 유지보수가 쉬운 웹 응용프로그램을 선호했기 때문이다. 하지만 이제는 다양한 고객의 요구조건을 웹 응용 프로그램이 충족시키기에는 한계가 있다. 이런 문제를 해결하고자 많은 기업은 앞 다투어서 새로운 인터넷 구조인X-Internet기반의 응용프로그램을 출시하고 있으면 기업들도 도입을 서두르고 있다. 본 논문은 X-Internet 기반의 응용프로그램과 웹 응용프로그램의 성능을 비교 분석함으로써 X-Internet 기술의 가능성을 알아보고자 한다.

  • PDF

Internet Roundtrip Delay Prediction Using the Maximum Entropy Principle

  • Liu, Peter Xiaoping;Meng, Max Q-H;Gu, Jason
    • Journal of Communications and Networks
    • /
    • 제5권1호
    • /
    • pp.65-72
    • /
    • 2003
  • Internet roundtrip delay/time (RTT) prediction plays an important role in detecting packet losses in reliable transport protocols for traditional web applications and determining proper transmission rates in many rate-based TCP-friendly protocols for Internet-based real-time applications. The widely adopted autoregressive and moving average (ARMA) model with fixed-parameters is shown to be insufficient for all scenarios due to its intrinsic limitation that it filters out all high-frequency components of RTT dynamics. In this paper, we introduce a novel parameter-varying RTT model for Internet roundtrip time prediction based on the information theory and the maximum entropy principle (MEP). Since the coefficients of the proposed RTT model are updated dynamically, the model is adaptive and it tracks RTT dynamics rapidly. The results of our experiments show that the MEP algorithm works better than the ARMA method in both RTT prediction and RTO estimation.

혼잡효과가 있는 경우의 인터넷 백본서비스의 품질차별화 전략 (Quality Discrimination on the Internet under Congestion Effects and Strategic Behavior by Users)

  • 정충영
    • 기술혁신학회지
    • /
    • 제9권4호
    • /
    • pp.740-758
    • /
    • 2006
  • 이 논문은 인터넷 백본서비스 품질에 대해 서로 다른 반응도를 가진 사용자가 있는 경우, 백본을 보유한 독점적 기업은 자사의 서비스에 대해 가격을 어떻게 차별화 하는가를 분석하고 있다. 특별히, 인터넷 사용에 있어 혼잡이 있는 경우, 비선형적인 가격책정이 어떻게 진행되는 것인가에 초점을 맞추고 있다. 인터넷 혼잡효과를 고려할 경우, 제공되는 서비스 품질은 특수한 상황 하에서 망사용자의 전략적 형태와 인터넷 상에 제공되는 어플리케이션의 특성과 무관하게 사회적 최적으로 제공할 수 있음을 보여주고 있다. 또한 사회적 최적품질의 서비스가 제공되지 않는 경우에 있어서 파라미터의 조건들을 제시하고 있다.

  • PDF

Distributed Design System as a New Paradigm Towards Future Collaborative Architectural Design Process

  • Han, Seung Hoon
    • Architectural research
    • /
    • 제7권2호
    • /
    • pp.23-33
    • /
    • 2005
  • The use of computers in architectural professions has grown with the power of easy data management, increased sophistication of standalone applications, inexpensive hardware, improved speed of processing, use of standard library and tools for communication and collaboration. Recently, there has been a growing interest in distributed CAAD (Computer-Aided Architectural Design) integration due to the needs of direct collaboration among project participants in different locations, and Internet is becoming the optimal tool for collaboration among participants in architectural design and construction projects. The aim of this research is to provide a new paradigm for a CAAD system by combining research on integrated CAAD applications with recent collaboration technologies. To accomplish this research objective, interactive three-dimensional (3D) design tools and applications running on the Web have been developed for an Internet-based distributed CAAD application system, specifically designed to meet the requirements of the architectural design process. To this end, two different scopes of implementation are evaluated: first, global architecture and the functionality of a distributed CAAD system; and, second, the association of an architectural application to the system.